combating cyber crime by priyanka tomar @ owasp delhi july, 2014 meeting

23
Presentation by : Priyanka Tomar [email protected]

Upload: owasp

Post on 26-May-2015

537 views

Category:

Internet


3 download

DESCRIPTION

Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting in Adobe Systems, Noida

TRANSCRIPT

Page 1: Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting

Presentation by : Priyanka Tomar

[email protected]

Page 2: Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting

Objective Provide a brief idea of cyber/computer attacks and

preventive measure to be adopted with reference to Law Enforcement Agencies.

Page 3: Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting

PREREQUISITES Computer Hardware

Computer Software

Internet Surfing

Email

Networking

IP Address

Page 4: Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting

Combating Cyber Crime Cyber + Security

What is Security

What is Cyber Security

involves detection, prevention and responding to attacks

Why do we need Cyber Security –Phishing, Credit Card Frauds

Page 5: Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting

Combating Cyber Crime Who is Vulnerable –e.g. screen hack

Page 6: Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting

Cyber Security Threats Virus

Worm

Trojan Horse Remote Administration Tool – Prorat, Poison Ivy

Page 7: Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting

Cyber Security Threats-RATThe operator controls the RAT through a network connection. RAT

provide an operator the following capabilities:

Screen/camera control.

File management (download/upload/execute etc.

Shell control (from command prompt).

Computer control (power off/on/log off).

Registry management (query/add/delete/modify).

Start, stop and restart Windows services.

Copy/delete files and format disks.

View and clear the windows event logs.

Other software product-specific functions.

Page 8: Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting

Cyber Security Threats Hackers

Identity Thieves

Spyware/Adware Website advertisements

Page 9: Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting

Consequences of Inaction Loss of access

Loss of confidentiality, integrity and public trust

Lawsuits, Disciplinary action

The US has charged six members of an international cybercrime gang that hacked into user accounts to defraud eBay's Stubhub ticket reselling website of about $1m.

The men were arrested in the UK, Canada and Spain in connection with the scam in which more than 1,600 StubHub users had their credit cards used to buy tickets, which were then sold on by the criminals.

Page 10: Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting

Preventive Measures -I OS/Software Updates

Anti virus

Personal Firewalls Check Open Ports -http://www.auditmypc.com/firewall-test.asp

Page 11: Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting

How to block Ports Block Ports

Control Panel>System and Security> Windows Firewall

Advanced Settings

See inbound and outbound rules

Create your own rule

Page 12: Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting
Page 13: Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting
Page 14: Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting
Page 15: Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting
Page 16: Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting

How to know if there is spyware?

Endless pop-up windows.

Redirected to other websites automatically.

Random Windows error messages .

Computer suddenly seems slow.

New and unexpected toolbars appear in web browser.

New and unexpected icons appear in the task tray.

Browser's home page suddenly changed.

Search engine your browser opens has been changed.

Page 17: Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting

Don't click on links within pop-up windows

Be careful while installing free software , never forget to read user agreement.

Block pop-up windows and cookies by adjusting browser preferences.

Be aware of unexpected dialog boxes asking -Do you want to run a xxxx program . Always select "no" or "cancel," or close the dialog box.

Prevent Spyware Installation

Page 18: Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting

Remove Spyware Spyware copies several files to different directories and

changes the registry. Use a spyware remover - a program dedicated to removal of sypware.

Run a legitimate product to remove spyware e.gAd-Aware, Microsoft Window Defender, Webroot'sSpySweeper etc.

Page 19: Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting

Preventive Measures-II Prevent Identity Theft-Beware of phishing scams - a form of fraud that uses

email messages that appear to be from a reputable business (often a financial institution) in an attempt to gain personal/ financial account information. These often do not include a personal salutation. Never enter personal information into an online form you accessed via a link in an email you were not expecting. Legitimate businesses will not ask for personal information online.

Intrusion Detection Software/Device

Page 20: Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting

PhishingGoogle Security Team to Sunitha

Verification Required.

Dear Gmail User,

The Gmail infrastructure is going through an annual security and performance overhaul. In the same respect, youare requested to verify your account by clicking on the following link. The Google Security Team is available toprovide you all the assistance for secure communication over the Internet. Happy surfing!

accountverification.gmail.com/src/verify.php?confirmation=dhPGcsiuUNdnAoN77q5CHwCgl4MmCAXE72d

You are requested to act on this immediately to guarantee the smooth functioning of your mail account.

Thanks,Account Security AdministratorGoogle Security TeamGoogle, Inc. Phone: +1 650-253-0000

You are receiving this message from Google because you are a valued member. Google respects your privacy. To learn more, please read our online Privacy Statement. For more information or for general questions regarding your e-mail account, please visit Gmail Help.

Google Inc, 1600 Amphitheatre Parkway, Mountain View, CA 94043. All rights reserved.

Page 21: Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting

Preventive Measures

Protect Passwords

Regular Backup

Page 22: Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting

Preventive Measures -II Setup Cyber Security Policies

Email Virus Filtering Services

Firewall Services

Email attachment Filtering

Vulnerability Scanning

Intrusion Prevention System

Page 23: Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting

By: Priyanka Tomar

[email protected]